Static task
static1
Behavioral task
behavioral1
Sample
8293db7848afc414fdb4e546071c492b1fb4606e4529b9303923a744d6139ed5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8293db7848afc414fdb4e546071c492b1fb4606e4529b9303923a744d6139ed5.exe
Resource
win10v2004-20220812-en
General
-
Target
8293db7848afc414fdb4e546071c492b1fb4606e4529b9303923a744d6139ed5
-
Size
286KB
-
MD5
3eb760f4c274665bf625a2813e56341f
-
SHA1
4b6e58ba4caba835056c1878eec17d97369db672
-
SHA256
8293db7848afc414fdb4e546071c492b1fb4606e4529b9303923a744d6139ed5
-
SHA512
c5df6e6d2496ad048788e247b25a05f794e4e36e9e4bd01b70276837f8c69444d9ae4abd28010fefc97256447fa7610362864cb4e4611f201f395096f21e738e
-
SSDEEP
6144:rUuNvwsP6pv4OlC3Hk+P+L+KwEaMymFZDgGg5H0+gJWp:YM4sylmHb+LxxXg9H0HG
Malware Config
Signatures
Files
-
8293db7848afc414fdb4e546071c492b1fb4606e4529b9303923a744d6139ed5.exe windows x86
1052b239a7a4f9bf6b294105faf303cd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
SetStdHandle
LoadLibraryA
GlobalGetAtomNameA
FreeLibrary
WriteConsoleA
GetSystemTimeAsFileTime
GetCurrentProcessId
IsValidCodePage
SetFilePointer
GetCurrentProcess
IsDebuggerPresent
VirtualAlloc
GetDateFormatA
GetTimeFormatA
GetOEMCP
EnumResourceNamesW
GetACP
TerminateProcess
UnhandledExceptionFilter
MultiByteToWideChar
SetUnhandledExceptionFilter
GetStringTypeA
HeapSize
InitializeCriticalSection
WriteFile
HeapReAlloc
GetLocaleInfoA
RtlUnwind
EnterCriticalSection
GetConsoleOutputCP
GetCPInfo
RaiseException
rpcrt4
RpcStringFreeA
shlwapi
SHCreateStreamOnFileW
SHCreateStreamOnFileEx
PathAppendA
PathIsContentTypeA
PathIsFileSpecA
PathCreateFromUrlW
Sections
.text Size: 141KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ